Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Partner Perspectives //

bitdefender

1/19/2017
11:00 AM
Liviu Arsene
Liviu Arsene
Partner Perspectives
Connect Directly
Twitter
Google+
LinkedIn
RSS
50%
50%

What to Consider When Moving To Hyperconverged Infrastructure

Scalability, data availability, and agility are three reasons why enterprises are making the move to HCI.

IT decision makers have been tasked with the challenge of not only expanding the technical capabilities of their infrastructures, but also with providing high availability, scalability, simplicity and security. Digitalization has transformed the way businesses operate and boost revenue. To that end, Gartner has recently estimated worldwide IT spending will reach $3.5 trillion in 2017.

Moving to a hyperconverged infrastructure (HCI) offers significant benefits for large organizations, as software-defined datacenters (SDDC) reduce the complexity of managing multiple hardware and software platforms, and lower operational costs by using hardware as a single pool of resources shared across multiple applications. IT decision makers often have to present these two main benefits when facing the board of directors, but the decision-making process should also consider business continuity and the ability to quickly meet new demands.

Scalability
Hyperconverged integrated systems and infrastructures let organizations quickly deploy new services and applications without the cost of new hardware or upgrades. Because the SDDC revolves around the use of commodity hardware, the software layer is actually designed to manage aggregated resources across multiple individual nodes, focusing on mass centralization and integration. Reliance on vendor-specific hardware becomes obsolete, allowing more flexibility and efficiency.

Data Availability and Mobility
Agnostic components ranging from hardware to hypervisors and other technologies allow data to move fluidly between services and applications, meeting SLA requirements. Hyperconverged infrastructures allow different storage tiers - solid-state storage and spinning-disk – and see beyond the input/output blender by optimizing storage resources based on the individual profile or requirements of each VM.  Resource pools also allow for resource islands that serve the requirements of specific applications, allowing administrators to focus on applications instead of allocating resources.

Agility and Automation
Because software-defined datacenters place all physical resources under a unified administrative umbrella, IT departments can migrate workloads a lot faster than in legacy systems. This means they can also focus more on scripting and activity scheduling, without worrying about compatibility with vendor-specific hardware and products. Having everything in a single environment that can support VMs and policy management across the entire infrastructure makes the SDDC a highly agile environment.

Bottom Line
HCI and SDDC can help businesses decrease their total cost of ownership while rapidly delivering applications. Because the infrastructure stack is highly simplified and abstracted, businesses and organizations can focus on application mobility. While from a CAPEX perspective hardware acquisition is somewhat similar to legacy datacenters, from an OPEX perspective, costs can be significantly reduced.

Liviu Arsene is a senior e-threat analyst for Bitdefender, with a strong background in security and technology. Reporting on global trends and developments in computer security, he writes about malware outbreaks and security incidents while coordinating with technical and ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9405
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated reflected XSS via the redirect page.
CVE-2020-9406
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows unauthenticated eval injection via the queryBCP method of the Auxiliary Service.
CVE-2020-9407
PUBLISHED: 2020-02-26
IBL Online Weather before 4.3.5a allows attackers to obtain sensitive information by reading the IWEBSERVICE_JSONRPC_COOKIE cookie.
CVE-2020-9398
PUBLISHED: 2020-02-25
ISPConfig before 3.1.15p3, when the undocumented reverse_proxy_panel_allowed=sites option is manually enabled, allows SQL Injection.
CVE-2015-5201
PUBLISHED: 2020-02-25
VDSM and libvirt in Red Hat Enterprise Virtualization Hypervisor (aka RHEV-H) 7-7.x before 7-7.2-20151119.0 and 6-6.x before 6-6.7-20151117.0 as packaged in Red Hat Enterprise Virtualization before 3.5.6 when VSDM is run with -spice disable-ticketing and a VM is suspended and then restored, allows r...